Although port scanning is not a network attack by itself, the information gathered from scanning can be used for future attacks. Discuss the legal and ethical issues around port scanning on a network that someone is not directly responsible for.